EP2795838B1 - Method, logic and network element for policy selection and switching function in a network environment - Google Patents
Method, logic and network element for policy selection and switching function in a network environment Download PDFInfo
- Publication number
- EP2795838B1 EP2795838B1 EP12748608.2A EP12748608A EP2795838B1 EP 2795838 B1 EP2795838 B1 EP 2795838B1 EP 12748608 A EP12748608 A EP 12748608A EP 2795838 B1 EP2795838 B1 EP 2795838B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- policy
- subscriber
- service
- default
- access gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 24
- 230000006870 function Effects 0.000 claims description 19
- 230000006399 behavior Effects 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 2
- 238000012546 transfer Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 51
- 230000000694 effects Effects 0.000 description 13
- 239000003795 chemical substances by application Substances 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000004931 aggregating effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009118 appropriate response Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000012913 prioritisation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5051—Service on demand, e.g. definition and deployment of services in real time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
- H04L12/1407—Policy-and-charging control [PCC] architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
Definitions
- This disclosure relates in general to the field of communications and, more particularly, to a policy selection and switching function in a network environment.
- End users have more media and communications choices than ever before.
- a number of prominent technological trends are currently afoot (e.g., more computing devices, more online video services, more Internet video traffic), and these trends are changing the content delivery landscape.
- these trends are pushing the limits of capacity and, further, degrading the performance of data delivery systems, where such degradation creates frustration amongst end users, content providers, and service providers.
- subscriber and/or service policy rules that determine how the data will be delivered cannot be obtained efficiently, or the data sought for delivery cannot comply with a set of subscriber and service policy rules.
- subscriber and/or service policy rules that determine how the data will be delivered cannot be obtained efficiently, or the data sought for delivery cannot comply with a set of subscriber and service policy rules.
- a method is provided in one example embodiment and includes receiving a request for a service for a subscriber at an access gateway; receiving a default subscriber policy and a default service policy at the access gateway; receiving a subscriber policy and a service policy for the service being requested at the access gateway; receiving the service being requested at the access gateway; and communicating the service being requested from the access gateway to the subscriber in response to the request.
- the method may include identifying information within a bearer service request associated with a particular subscriber; and determining a specific service policy and charging rules function (PCRF) server to be used for a particular transaction involving the particular subscriber.
- the information within the bearer service request may include a destination address, a 5-tuple, or a uniform resource locator (URL) provided in a hypertext transfer protocol (HTTP) header.
- the access gateway may include a local PCRF functionality to be provided to a particular subscriber.
- the access gateway is configured to evaluate behavior associated with the subscriber in order to respond to subscriber policy requests for particular network services.
- the access gateway is configured to determine a subset of subscribers accessing similar services, and to group the subset of subscribers into a subscriber group for which a specific group policy is applied to.
- the subscriber group can be formed based on usage trends and current services associated with the subset of subscribers.
- the method may include receiving a second subscriber policy and a second service policy for the requested service if the subscriber policy and the service policy for the service being requested do not conform to the default subscriber policy and the default service policy.
- FIGURE 1A is a simplified block diagram of a communication system 10 for a policy selection and switching function in accordance with one embodiment of the present disclosure.
- Communication system 10 includes multiple instances of customer premise equipment (CPEs) 12a-e, a network 14, an access gateway 16, a connection server 18, a default policy and charging rules function (D-PCRF) server 20, service policy and charging rules function (S-PCRF) servers 22a and 22b, and service providers 24a and 24b.
- Access gateway 16 may include an access module 26 in a particular embodiment. Access module 26 may include a processor 34a and a memory 36a.
- Connection server 18 may include a connection module 28, which may include a processor 34b and a memory 36b.
- D-PCRF server 20 may include a default subscriber and service policy/charging module 30.
- Default subscriber and service policy/charging module 30 may include a processor 34c and a memory 36c.
- S-PCRF 22a and 22b each contain a subscriber and service policy module 32.
- Subscriber and service policy module 32 may include a processor 34d and a memory 36d.
- communication system 10 may be configured for service-specific policy and charging rules function (PCRF)-selection/delegation and communication based on information derived from a bearer plane of access gateway 16.
- PCRF policy and charging rules function
- a hierarchical or segmented policy server deployment (as a means of policy server offload and reduced system latency may also be implemented).
- a subscriber group policy may be implemented, as a means of aggregating multiple subscriber requests for the same service. Such implementations may offer an improvement over an application-specific policy server deployment, or subscriber/APN-specific policy server deployments.
- communication system 10 may be configured to allow a gateway to interact with multiple PCRFs per Access Point Name (APN) (e.g., APN + user equipment (UE) + Flow)) instead of a gateway that can only interact with a single PCRF per APN (e.g., APN+UE).
- APN Access Point Name
- UE user equipment
- Flow PCRFs per Access Point Name
- a mobile operator may not need to own policy rules for every service, especially those that are provided by entities who have business relationships that allow preferential treatment over communication system 10, and where a load can be distributed off a single PCRF point of failure.
- the deployment of best-of-breed policy/analytics engines may be done without large integration efforts.
- communication system 10 may be configured such that local and remote policies can be defined and queried in serial, and a gateway provides the correlation and discrepancy resolution to correlate/resolve any discrepancies between the policies.
- a gateway provides the correlation and discrepancy resolution to correlate/resolve any discrepancies between the policies.
- disparate policy systems may be integrated with an automatic dispute resolution process.
- access gateway 16 may be configured as an IP session anchor and a policy session anchor where an IP session anchor and a policy session anchor may be converged.
- communication system 10 may be configured to allow PCRF chaining to be done on a Gx path (i.e., path between a gateway and a PCRF in a long term evolution (LTE) architecture) instead of chaining of PCRFs using an Rx path (i.e., path between an interface northbound of a PCRF in an LTE architecture).
- Gx path i.e., path between a gateway and a PCRF in a long term evolution (LTE) architecture
- Rx path i.e., path between an interface northbound of a PCRF in an LTE architecture.
- 3GPP 3rd Generation Partnership Project
- mobile standards organizations define interaction with a PCRF for establishment policy (e.g. quality of service (QoS)) and charging rules on a per-subscriber and a per-application basis.
- QoS quality of service
- a single policy system maintaining all policy and charging rules for every application and every subscriber may not be a pragmatic approach, as transaction rates to the PCRF grow significantly with mobility events, application events, and policy decision requests.
- policy decision requests are related to interactive or real-time services, where the added delay incurred by communication and processing with a separate PCRF may lead to a suboptimal end-user experience. Conversely, complex and comprehensive policies for some services may be best provided by a separate PCRF.
- communication system 10 may be configured to allow an edge gateway (e.g. packet data network gateway (PGW), broadband data network gateway (BNG), etc.) to select a unique policy server based on bearer flow information (such as 5-tuple or DPI), rather than strictly on a pre-configured static server (or agent) address or APN. Additionally, communication system 10 may be configured for a PCRF to delegate further PCRF operations for a bearer flow to a different PCRF (e.g. to a PCRF available locally on an edge gateway).
- PGW packet data network gateway
- BNG broadband data network gateway
- communication system 10 can allow a single gateway to communicate with multiple PCRFs.
- a subscriber attaches to the network and the edge gateway to retrieve PCRF information.
- a PCRF is denoted as the default PCRF, or D-PCRF (e.g., D-PCRF 20) and the subscriber session is anchored at the D-PCRF for retrieval of all subscriber-specific policies.
- D-PCRF e.g., D-PCRF 20
- D-PCRF D-PCRF
- Part of the policy profile defines the set of services that can be handled by S-PCRFs (e.g., S-PCRF 22a and 22b), which may or may not be co-located with a D-PCEF.
- a subscriber accesses a service, either operator-owned or partnered, in which a specific policy must be applied (i.e., the service has an integrated PCRF function).
- the gateway is configured to understand, based on information contained in the bearer service request (e.g., destination address, 5-tuple, URL in HTTP header, DPI, etc.) that a specific S-PCRF is to be used for a specific transaction.
- the gateway may also inform the D-PCRF of a service-specific policy either at session establishment, or at termination. This embodiment enables application-specific policies and macro policies to interwork through the edge gateway.
- the gateway may have embedded or local PCRF functionality available.
- the gateway may determine, based on subscriber behavior and bearer flows, that a local PCRF, specified with a subset of functionality of the S-PCRF, may adequately respond to subscriber policy requests for certain services.
- This embodiment allows gateway adjacent or co-located PCRFs to be deployed as a policy offload function for network-wide S-PCRFs, or hierarchical policy.
- the gateway determines that a subset of subscribers is accessing similar services, which may or may not be predefined.
- the gateway may be configured to correlate the subset of subscribers into a subscriber group.
- the subscriber group may be grouped by location, service requested, application-specific, D-PCRF specific, etc.
- one request to a PCRF could set the policy for the entire group such that the policy does not have to be requested for each member of the group.
- communications flow may be used to set policy for each subscriber of the group, rather than an individual communications flow per subscriber.
- Subscriber group policy allows the dynamic classification and systematic clustering of subscribers with similar attributes (e.g., usage trends, current services, preferences, profile, etc.) to be clustered and treated in a common manner. While some level of subscriber group policy can be achieved statically, the system allows for dynamic group policy creation based on individual member interactions with the network, with services, or with each other.
- CPEs 12a-e can be associated with clients, customers, endpoints, handheld devices, or end users wishing to initiate a communication in communication system 10 via some network.
- the term 'subscriber' is inclusive of these elements, as well as devices used to initiate a communication, such as a receiver, a computer, a set-top box, an Internet radio device (IRD), a cell phone, a smart phone, a tablet, a personal digital assistant (PDA), an iPad, an iPhone, a Google Droid, or any other device, component, element, or object capable of initiating voice, audio, video, media, or data exchanges within communication system 10.
- IFD Internet radio device
- PDA personal digital assistant
- Google Droid any other device, component, element, or object capable of initiating voice, audio, video, media, or data exchanges within communication system 10.
- CPEs 12a-e may also be inclusive of a suitable interface to the human user, such as a display, a keyboard, a touchpad, a remote control, or other terminal equipment.
- CPEs 12a-e may also be any device that seeks to initiate a communication on behalf of another entity or element, such as a program, a database, or any other component, device, element, or object capable of initiating an exchange within communication system 10.
- Data refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
- Connection server 18 may be an authentication, authorization, and accounting (AAA) server or home subscriber service (HSS) server.
- AAA authentication refers to the process where a user's or CPE's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials.
- the authorization function determines whether a particular user or CPE is authorized to perform a given activity, typically inherited from authentication when logging on to an application or service.
- Accounting refers to the tracking of network resource consumption by users or CPEs for the purpose of capacity and trend analysis, cost allocation, billing, etc.
- a HSS server typically contains subscription-related information (subscriber profiles for users or CPEs 12a-e), performs authentication and authorization of the users or CPEs, and can provide information about the subscriber's location and IP information.
- D-PCRF server 20 may be an operator-owned entity residing under operational control of the same entity that owns network 14.
- D-PCRF server 20 may be configured to determine policy rules in a multimedia network.
- D-PCRF server 20 may be configured to determine policy rules for a specific subscriber such as how to treat a subscriber (e.g., CPEs 12a-e) for aggregate services, how to prioritize service lists, generic charging/QoS for undefined services, etc.
- D-PCRF server 20 may also be configured to provide a service definition (e.g., 5-tuple, Appl-layer, etc.), the location of service specific S-PCRF servers 22a and 22b, etc.
- D-PCRF server 20 may accesses subscriber databases and other specialized functions, such as charging systems, in a scalable and centralized manner.
- S-PCRF may or may not be an operator-owned entity (meaning there is no requirement that network 14 and S-PCRF servers 22a and 22b are within the same operational domain).
- S-PCRF servers 22a and 22b may be configured to determine policy rules that are specific to the service being provided (policy rules different than D-PCRFS server 20) in a multimedia network.
- S-PCRF servers 22a and 22b may be configured to determine charging/QoS rules for a specific service.
- S-PCRF servers 22a and 22b may also be configured to determine how to treat the specific service for aggregate subscribers and contain a subscriber prioritization list for the specific service.
- D-PCRF server 20 and S-PCRF servers 22a and 22b can be part of a network architecture that aggregates information to and from network 14, operational support systems, and other sources (such as portals) in real time and supports the creation of rules and then makes policy decisions for each user or CPEs 12a-e active on the network.
- a network can offer multiple services, policies such as quality of service (QoS) levels, and charging rules.
- QoS quality of service
- Network 14 represents a series of points or nodes of interconnected communication paths for receiving and transmitting packets of information that propagate through the architecture.
- Network 14 offers a communicative interface between sources and/or hosts, and each may be any local area network (LAN), wireless local area network (WLAN), metropolitan area network (MAN), Intranet, Extranet, WAN, virtual private network (VPN), or any other appropriate architecture or system that facilitates communications in a network environment.
- the architecture of the present disclosure may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network.
- TCP/IP transmission control protocol/internet protocol
- the architecture of the present disclosure may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol, where appropriate and based on particular needs.
- UDP/IP user datagram protocol/IP
- Network 14 may implement a UDP/IP connection and use a TCP/IP communication language protocol in particular embodiments of the present disclosure. Further, network 14 may implement any other suitable communication protocol for transmitting and receiving data packets within the architecture.
- Data refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
- the architecture of the present disclosure can be associated with a service provider digital subscriber line (DSL) deployment.
- DSL digital subscriber line
- the architecture of the present disclosure would be equally applicable to other communication environments, such as an enterprise wide area network (WAN) deployment, cable scenarios, broadband generally, fixed wireless instances, fiber to the x (FTTx), which is a generic term for any broadband network architecture that uses optical fiber in last-mile architectures.
- the architecture of the present disclosure may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network.
- TCP/IP transmission control protocol/internet protocol
- the architecture of the present disclosure may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol, where appropriate and based on particular needs.
- UDP/IP user datagram protocol/IP
- Access gateway 16 connection server 18, D-PCRF server 20 and S-PCRF servers 22a and 22b are network elements that can facilitate the access activities discussed herein.
- the term 'network element' is meant to encompass any of the aforementioned elements, as well as routers, switches, cable boxes, gateways, bridges, load balancers, firewalls, inline service nodes, proxies, servers, processors, modules, or any other suitable device, component, element, proprietary appliance, or object operable to exchange information in a network environment.
- These network elements may include any suitable hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
- access gateway 16, connection server 18, D-PCRF server 20 and/or S-PCRF servers 22a and 22b include software to achieve (or to foster) the policy and switching activities discussed herein. This could include the implementation of instances of access module 26, connection module 28, default subscriber and service policy/charging module 30, and subscriber and service policy module 32. Additionally, each of these elements can have an internal structure (e.g., a processor, a memory element, etc.) to facilitate some of the operations described herein. In other embodiments, these policy and switching activities may be executed externally to these elements, or included in some other network element to achieve the intended functionality.
- access gateway 16, connection server 18, D-PCRF server 20 and S-PCRF servers 22a and 22b may include software (or reciprocating software) that can coordinate with other network elements in order to achieve the policy and switching activities described herein.
- one or several devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
- FIGURE 1B is a simplified block diagram illustrating one possible set of details associated with communication system 10.
- This particular configuration includes CPEs 12a-e, network 14, access gateway 16, connection server 18, and service provider 24a.
- CPEs 12a-c are grouped into a first group 38a.
- CPEs 12d and 12e are grouped into a second group 38b.
- Access gateway 16 may include access module 26 and default subscriber and service policy/charging module 30.
- Access module 26 may include processor 34a and memory 36a.
- Default subscriber and service policy/charging module 30 may include processor 34c and memory 36c.
- Connection server 18 may include connection module 28.
- Connection module 28 may include processor 34b and memory 36b.
- Service provider 24a may include subscriber and service module 32. Subscriber and service module 32 may include processor 34d and memory 36d.
- First group 38a has at least one common characteristic such as location, service requested, application-specific, D-PCRF specific, etc.
- a PCRF e.g., D-PCRF 20 or S-PCRF 22a
- communications flow can be used to set policy for each subscriber of the group, rather than an individual communications flow per subscriber.
- second group 38b has at least one common characteristic such as location, service requested, application-specific, D-PCRF specific, etc. Note that at least one common characteristic for second group 38b may or may not be different than the at least one common characteristic for first group 38a.
- a PCRF e.g., D-PCRF 20 or S-PCRF 22a
- communications flow can be used to set policy for each subscriber of the group, rather than an individual communications flow per subscriber.
- CPE 12a sends a request for a service to access gateway 16.
- Access gateway 16 uses access module 26 to access connection server 18 for authentication on the network.
- default subscriber and service policy/charging module 30 is accessed to obtain default subscriber and service policies (default subscriber and service policy/charging module 30 can be located in access gateway 16 or D-PCRF 20, as shown in FIGURE 1 ).
- Subscriber and service policy module 32 is accessed to determine service specific subscriber and service polices (subscriber and service policy module 32 can be located in service provider 24a or 24b or S-PCRF 22a and 22b as shown in FIGURE 1 ).
- Access module 26 or default subscriber and service policy/charging module 30 may also determine the location of subscriber and service module 32.
- access gateway 16 may obtain the maximum allowable download speed for CPE 12a and the maximum amount of data that CPE 12a can download from default subscriber and service policy/charging module 30. Then, subscriber and service policy module 32 is located and access gateway 16 may obtain the allowable download speed for the service and the amount of data that will be downloaded for the service from subscriber and service policy module 32. Access gateway 16 can then obtain the service from a provider of the service (e.g., service provider 24a) and sent the requested service to CPE 12a using the default subscriber and service policies from default subscriber and service policy/charging module 30 and the service specific subscriber and service polices from subscriber and service policy module 32.
- a provider of the service e.g., service provider 24a
- FIGURE 1C is a simplified block diagram illustrating one possible set of details associated with access gateway 16.
- Access gateway may include access module 26.
- Access module 26 may include processor 34a and memory 36a.
- access gateway 16 may also include a gateway general packet radio service support node (GGSN) 40, a home agent 42, a packet data network gateway (PGW) 44, a session border controller (SBC) 46, a deep packet inspection (DPI) URL filtering monitor 50, a video gateway 52, or any combination thereof.
- GGSN gateway general packet radio service support node
- PGW packet data network gateway
- SBC session border controller
- DPI deep packet inspection
- GGSN 40 may be a component of a GPRS network. GGSN 40 may be responsible for the interworking between the GPRS network and external packet switched networks, (e.g., the Internet and X.25 networks). From an external network's point of view, GGSN 40 can be a router to a sub-network, because GGSN 40 can 'hide' the GPRS infrastructure from the external network. In one example, GGSN 40 is an anchor point that enables the mobility of a user terminal in GPRS/UMTS networks. In essence, GGSN 40 carries out the role in GPRS equivalent to the home agent in mobile IP. GGSN 40 can maintain routing necessary to tunnel the Protocol Data Units (PDUs) to the SGSN that services a particular mobile station.
- PDUs Protocol Data Units
- Home agent 42 may be a router on a mobile node's home network which tunnels datagrams for delivery to the mobile node (e.g., a mobile CPE 12a) when the mobile node is away from home.
- Home agent 42 can be configured to maintain current location (IP address) information for the mobile node.
- Home agent 42 may be used in a Mobile IP (or IP mobility) protocol.
- Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. (Mobile IP for IPv4 is described in IETF RFC 5944, and extensions are defined in IETF RFC 4721 and Mobile IPv6 is described in RFC 6275.)
- PGW 44 can act as the interface between a LTE network and other packet data networks, such as the Internet, or SIP-based IMS networks.
- PGW 44 may serve as an anchor point for network mobility and act as a policy and charging enforcement function (PCEF), manage QoS, and/or provide DPI and lawful intercept of data packets.
- PCEF policy and charging enforcement function
- PGW 44 may consist of S5/S8 control and data plane stacks to support S5/S8 interface with a serving gateway.
- PGW 44 can support a S5/S8 interface with the serving gateway.
- An integrated control plane stack for the S5/S8 interfaces can consist of IP, UDP, eGTP-C, etc.
- the integrated data plane stack for the S5/S8 interface can consist of IP, UDP, eGTP-U, etc.
- SBC 46 may be a device deployed in Voice over Internet Protocol (VoIP) networks to exert control over the signaling and also the media streams involved in setting up, conducting, and tearing down telephone calls or other interactive media communications.
- VoIP Voice over Internet Protocol
- SBC 46 can be configured to be on the borders between two service provider networks in a peering environment or to include significant deployments between a service provider's access network and a backbone network to provide service to residential and/or enterprise customers.
- SBC 46 can be inserted into signaling and/or media paths between calling and called parties in a VoIP call, predominantly those using a Session Initiation Protocol (SIP), H.323, and MGCP call signaling protocols.
- SIP Session Initiation Protocol
- FIGURE 2 is a simplified flowchart 200 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure.
- a CPE connects to access gateway and requests a service.
- CPE 12a connects to access gateway 16.
- the access gateway communicates with a connection server to authenticate the CPE.
- access gateway 16 may connect to connection server 18 to authenticate CPE 12a.
- the system determines if the CPE was authenticated. If the CPE was not authenticated, then the process can stop. If the CPE was authenticated, then a default subscriber policy and a default service policy are obtained, as in 208.
- the default subscriber policy and default service policy may be obtained from D-PCRF server 20.
- a subscriber policy and a service policy for the requested service are obtained from a source for the requested service.
- a subscriber policy and a service policy for the requested service may be obtained from S-PCRF server 22a.
- the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service in the default subscriber policy and the default service policy.
- the requested service may be obtained from service provider 24a and delivered to CPE 12a using the subscriber policy in the service policy for the requested service obtained from S-PCRF server 22a and the default subscriber policy in the default service policy obtained from D-PCRF server 20.
- FIGURE 3 is a simplified flowchart 300 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure.
- a CPE connects to an access gateway and requests a service.
- CPE 12a connects to access gateway 16.
- the access gateway communicates with a connection server to authenticate the CPE.
- access gateway 16 may connect to connection module 28 located in connection server 18 to authenticate CPE 12a.
- a default subscriber policy and a default service policy are obtained.
- the default subscriber policy and default service policy may be obtained from default subscriber and service policy/charging module 30.
- a subscriber policy and a service policy for the requested service are obtained from a source of the requested service.
- a subscriber policy and a service policy for the requested service may be obtained from subscriber and service policy module 32 located in service provider 24a.
- the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service, and the default subscriber policy and the default service policy.
- the requested service may be obtained from service provider 24a and delivered to CPE 12a using the subscriber policy in the service policy for the requested service obtained from subscriber and service policy module 32 and the default subscriber policy in the default service policy obtained from default subscriber and service policy/charging module 30.
- the system determines if a request is received from the CPE for a new service. If the system determines that the received request is not from the CPE for a new service, then the process ends. If the system determines that the received request is from the CPE for a new service, then a new subscriber policy and a new service policy for the new requested service is obtained from a source of the new requested service, as in 314. For example, a subscriber policy and a service policy for the requested service may be obtained from S-PCRF server 22b. At 316, the new requested service is obtained and delivered to the CPE using the new subscriber policy and the new service policy for the new requested service in the default subscriber policy and the default service policy.
- the requested new service may be obtained from service provider 24b and delivered to CPE 12a using the subscriber policy in the service policy for the requested service obtained from S-PCRF server 22b and the default subscriber policy in the default service policy obtained from D-PCRF server 20.
- the system determines if a request is received from the CPE for a new service.
- FIGURE 4 is a simplified flowchart 400 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure.
- a CPE connects to an access gateway and requests a service.
- CPE 12a connects to access gateway 16.
- the access gateway communicates with a connection server to authenticate the CPE.
- access gateway 16 may connect to connection server 18 to authenticate CPE 12a.
- a default subscriber policy and a default service policy are obtained.
- the default subscriber policy and default service policy may be obtained from D-PCRF server 20.
- a subscriber policy and a service policy for the requested service are obtained from a source for the requested service.
- a subscriber policy and a service policy for the requested service may be obtained from S-PCRF server 22a, where S-PCRF server 22a has obtained the subscriber policy and service policy from service provider 24a.
- the system determines if the subscriber policy and the service policy for the requested service conform to the default subscriber policy in the default service policy. If the system determines that the subscriber policy and the service policy for the requested service information conform to the default subscriber policy and the default service policy, then the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service in the default subscriber policy and the default service policy, as in 412. If the system determines that the subscriber policy and the service policy for the requested service information do not conform to the default subscriber policy and the default service policy, then the system determines if the requested service can be obtained from a different server where the subscriber policy and the service policy for the requested service conforms to the default subscriber policy and the default service policy, as in 414. For example, a different subscriber policy and a service policy for the requested service may be obtained from S-PCRF server 22b, where S-PCRF server 22b has obtained the different subscriber policy and service policy from service provider 24b.
- the process ends. If the system determines that the subscriber policy and the service policy for the requested service cannot be obtained from a different server where the subscriber policy and the service policy for the requested service conforms to the default subscriber policy and the default service policy, then the process ends. If the system determines that the subscriber policy and the service policy for the requested service can be obtained from a different server where the subscriber policy and the service policy for the requested service conforms to the default subscriber policy and the default service policy, then the requested service is obtained from a different server and delivered to the CPE using the subscriber policy and the service policy from the different server and the default subscriber policy and the default service policy, as in 416.
- FIGURE 5 is a simplified flowchart 500 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure.
- a CPE connects to an access gateway and requests a service.
- CPE 12a connects to access gateway 16.
- the access gateway communicates with a connection server to authenticate the CPE.
- access gateway 16 may connect to connection server 18 to authenticate CPE 12a.
- a default subscriber policy and a default service policy are obtained.
- the default subscriber policy and default service policy may be obtained from default subscriber and service policy/charging module 30.
- a subscriber policy and a service policy for the requested service are obtained from a source for the requested service.
- a subscriber policy and a service policy for the requested service may be obtained from subscriber and service policy module 32 located in service provider 24a.
- the system determines if the subscriber policy and the service policy for the requested service conform to the default subscriber policy in the default service policy. If the system determines that the subscriber policy and the service policy for the requested service information conform to the default subscriber policy and the default service policy, then the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service in the default subscriber policy and the default service policy, as in 512. If the system determines that the subscriber policy and the service policy for the requested service information do not conform to the default subscriber policy and the default service policy, then the system determines if the subscriber policy and/or the service policy for the requested service can be changed to conform to the default subscriber policy and the default service policy, as in 514.
- the process ends. If the system determines that the subscriber policy and the service policy for the requested service cannot be changed to conform to the default subscriber policy and the default service policy, then the process ends. If the system determines that the subscriber policy and the service policy for the requested service can be changed to conform to the default subscriber policy and the default service policy, then the requested service is obtained and delivered to the CPE using the changed subscriber policy and/or the changed service policy the default subscriber policy and the default service policy, as in 516.
- the system determines if any subscriber policies and/or service policies for a previously requested service that is still being delivered to the CPE can be changed to allow the subscriber policy and/or the service policy for the requested service to conform to the default subscriber policy and the default service policy.
- a first requested service may be delivered using a specific download speed that conforms to the default subscriber policy and the default service policy and the subscriber policy and the service policy for the first requested service.
- a subscriber policy and a service policy for a second requested service does not conform to the default subscriber policy and the default service policy, then if possible, the subscriber policy and the service policy for the first requested service may be changed or the download speed for the first requested service may be changed to allow the subscriber policy and/or the service policy for the requested service to conform to the default subscriber policy and the default service policy.
- a network element e.g., an access gateway
- the policy and switching management functions outlined herein may be implemented by non-transitory logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor [processors 34a-d shown in FIGURES 1A and 1B ], or other similar machine, etc.).
- a memory element [memory 36a-d shown in FIGURES 1A and 1B ] can store data used for the operations described herein.
- the processor e.g., processor 34a-d
- the processor can execute any type of instructions associated with the data to achieve the operations detailed herein in this Specification.
- the processor could transform an element or an article (e.g., data) from one state or thing to another state or thing.
- the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by the processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array [FPGA], an erasable programmable read only memory (EPROM), an electrically erasable programmable ROM (EEPROM)) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof.
- FPGA field programmable gate array
- EPROM erasable programmable read only memory
- EEPROM electrically erasable programmable ROM
- any of these elements can include memory elements for storing information to be used in achieving the policy and switching activities as outlined herein.
- each of these devices may include a processor that can execute software or an algorithm to perform the access management activities as discussed in this Specification.
- These devices may further keep information in any suitable memory element [random access memory (RAM), ROM, EPROM, EEPROM, ASIC, etc.], software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs.
- RAM random access memory
- ROM read only memory
- EPROM Erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- ASIC application specific integrated circuitry
- any of the memory items discussed herein should be construed as being encompassed within the broad term 'memory element.
- any of the potential processing elements, modules, and machines described in this Specification should be construed as being encompassed within the broad term 'processor.
- Each of the network elements can also include suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment.
- communication system 10 (and its teachings) are readily scalable and, further, can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of communication system 10, as potentially applied to a myriad of other architectures.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
- This disclosure relates in general to the field of communications and, more particularly, to a policy selection and switching function in a network environment.
- End users have more media and communications choices than ever before. A number of prominent technological trends are currently afoot (e.g., more computing devices, more online video services, more Internet video traffic), and these trends are changing the content delivery landscape. Separately, these trends are pushing the limits of capacity and, further, degrading the performance of data delivery systems, where such degradation creates frustration amongst end users, content providers, and service providers. In some instances, subscriber and/or service policy rules that determine how the data will be delivered cannot be obtained efficiently, or the data sought for delivery cannot comply with a set of subscriber and service policy rules. Hence, there is a challenge in providing an appropriate response strategy for these problematic network scenarios.
- A Technical Report entitled "TR 23.803, evolution of policy control and charging, Release 7" published by the 3rd Generation Partnership Project (3GPP), Vol. 23.803, No. V 7.0.0, pages 1-30 in September 2005 concludes that harmonization and merger of the policy control and flow based charging architecture and procedures is feasible, and that adding end-user subscription differentiation and general policy control aspects to the policy and charging control is also feasible.
US 2011/167471 discloses a method performed at a policy charging and rules function (PCRF) node for providing group policy configuration in a communications network using a fake user.EP 2 073 449 discloses system for controlling user equipment connectivity to packet data networks, where the system includes a processor programmed to accept a user selection of one or more of the packet data networks maintained by a profile and to promote connection to the selected packet data networks. - To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:
-
FIGURE 1A is a simplified block diagram of a communication system for a policy selection and switching function in accordance with one embodiment of the present disclosure; - FIGURE IB is a simplified block diagram illustrating possible example details associated with the communication system;
-
FIGURE 1C is a simplified block diagram illustrating potential operations associated with the communication system; -
FIGURE 2 is a simplified flowchart illustrating potential operations associated with the communication system; -
FIGURE 3 is another simplified flowchart illustrating potential operations associated with the communication system; -
FIGURE 4 is another simplified flowchart illustrating potential operations associated with the communication system; and -
FIGURE 5 is another simplified flowchart illustrating potential operations associated with the communication system. - A method is provided in one example embodiment A method is provided in one example embodiment and includes receiving a request for a service for a subscriber at an access gateway; receiving a default subscriber policy and a default service policy at the access gateway; receiving a subscriber policy and a service policy for the service being requested at the access gateway; receiving the service being requested at the access gateway; and communicating the service being requested from the access gateway to the subscriber in response to the request.
- In more particular embodiment, the method may include identifying information within a bearer service request associated with a particular subscriber; and determining a specific service policy and charging rules function (PCRF) server to be used for a particular transaction involving the particular subscriber. The information within the bearer service request may include a destination address, a 5-tuple, or a uniform resource locator (URL) provided in a hypertext transfer protocol (HTTP) header. Additionally, the access gateway may include a local PCRF functionality to be provided to a particular subscriber.
- In specific implementations, the access gateway is configured to evaluate behavior associated with the subscriber in order to respond to subscriber policy requests for particular network services. In addition, the access gateway is configured to determine a subset of subscribers accessing similar services, and to group the subset of subscribers into a subscriber group for which a specific group policy is applied to. The subscriber group can be formed based on usage trends and current services associated with the subset of subscribers. In addition, the method may include receiving a second subscriber policy and a second service policy for the requested service if the subscriber policy and the service policy for the service being requested do not conform to the default subscriber policy and the default service policy.
- Turning to
FIGURE 1A, FIGURE 1A is a simplified block diagram of acommunication system 10 for a policy selection and switching function in accordance with one embodiment of the present disclosure.Communication system 10 includes multiple instances of customer premise equipment (CPEs) 12a-e, anetwork 14, anaccess gateway 16, aconnection server 18, a default policy and charging rules function (D-PCRF)server 20, service policy and charging rules function (S-PCRF)servers service providers Access gateway 16 may include anaccess module 26 in a particular embodiment.Access module 26 may include aprocessor 34a and amemory 36a.Connection server 18 may include aconnection module 28, which may include aprocessor 34b and amemory 36b. D-PCRF server 20 may include a default subscriber and service policy/charging module 30. Default subscriber and service policy/charging module 30 may include aprocessor 34c and amemory 36c. S-PCRF 22a and 22b each contain a subscriber andservice policy module 32. Subscriber andservice policy module 32 may include aprocessor 34d and amemory 36d. - In one particular instance,
communication system 10 may be configured for service-specific policy and charging rules function (PCRF)-selection/delegation and communication based on information derived from a bearer plane ofaccess gateway 16. A hierarchical or segmented policy server deployment (as a means of policy server offload and reduced system latency may also be implemented). In addition, a subscriber group policy may be implemented, as a means of aggregating multiple subscriber requests for the same service. Such implementations may offer an improvement over an application-specific policy server deployment, or subscriber/APN-specific policy server deployments. - In one particular instance,
communication system 10 may be configured to allow a gateway to interact with multiple PCRFs per Access Point Name (APN) (e.g., APN + user equipment (UE) + Flow)) instead of a gateway that can only interact with a single PCRF per APN (e.g., APN+UE). For example, a mobile operator may not need to own policy rules for every service, especially those that are provided by entities who have business relationships that allow preferential treatment overcommunication system 10, and where a load can be distributed off a single PCRF point of failure. Further, the deployment of best-of-breed policy/analytics engines may be done without large integration efforts. - In another particular instance,
communication system 10 may be configured such that local and remote policies can be defined and queried in serial, and a gateway provides the correlation and discrepancy resolution to correlate/resolve any discrepancies between the policies. Such a configuration could allow for more robust policy definition models. In addition, disparate policy systems may be integrated with an automatic dispute resolution process. In an embodiment,access gateway 16 may be configured as an IP session anchor and a policy session anchor where an IP session anchor and a policy session anchor may be converged. - In another particular instance,
communication system 10 may be configured to allow PCRF chaining to be done on a Gx path (i.e., path between a gateway and a PCRF in a long term evolution (LTE) architecture) instead of chaining of PCRFs using an Rx path (i.e., path between an interface northbound of a PCRF in an LTE architecture). Such a configuration can allow a gateway to own correlation of policies, both local and remote. In addition, the gateway may be configured to request multiple policies in parallel, rather than rely on a serial policy chain. - For purposes of illustrating certain example techniques of
communication system 10, it is important to understand the communications that may be traversing the network. The following foundational information may be viewed as a basis from which the present disclosure may be properly explained. 3rd Generation Partnership Project (3GPP) and mobile standards organizations define interaction with a PCRF for establishment policy (e.g. quality of service (QoS)) and charging rules on a per-subscriber and a per-application basis. A single policy system maintaining all policy and charging rules for every application and every subscriber may not be a pragmatic approach, as transaction rates to the PCRF grow significantly with mobility events, application events, and policy decision requests. Furthermore, some of the policy decision requests are related to interactive or real-time services, where the added delay incurred by communication and processing with a separate PCRF may lead to a suboptimal end-user experience. Conversely, complex and comprehensive policies for some services may be best provided by a separate PCRF. - In accordance with one example implementation, as more and more applications are vertically integrated with intelligent policy engines,
communication system 10 may be configured to allow an edge gateway (e.g. packet data network gateway (PGW), broadband data network gateway (BNG), etc.) to select a unique policy server based on bearer flow information (such as 5-tuple or DPI), rather than strictly on a pre-configured static server (or agent) address or APN. Additionally,communication system 10 may be configured for a PCRF to delegate further PCRF operations for a bearer flow to a different PCRF (e.g. to a PCRF available locally on an edge gateway). - In one embodiment, for a particular subscriber, service, or session,
communication system 10 can allow a single gateway to communicate with multiple PCRFs. For example, a subscriber attaches to the network and the edge gateway to retrieve PCRF information. A PCRF is denoted as the default PCRF, or D-PCRF (e.g., D-PCRF 20) and the subscriber session is anchored at the D-PCRF for retrieval of all subscriber-specific policies. Part of the policy profile defines the set of services that can be handled by S-PCRFs (e.g., S-PCRF - In accordance with one example implementation, a subscriber accesses a service, either operator-owned or partnered, in which a specific policy must be applied (i.e., the service has an integrated PCRF function). The gateway is configured to understand, based on information contained in the bearer service request (e.g., destination address, 5-tuple, URL in HTTP header, DPI, etc.) that a specific S-PCRF is to be used for a specific transaction. In this embodiment, the gateway may also inform the D-PCRF of a service-specific policy either at session establishment, or at termination. This embodiment enables application-specific policies and macro policies to interwork through the edge gateway.
- In another embodiment, the gateway may have embedded or local PCRF functionality available. The gateway may determine, based on subscriber behavior and bearer flows, that a local PCRF, specified with a subset of functionality of the S-PCRF, may adequately respond to subscriber policy requests for certain services. This embodiment allows gateway adjacent or co-located PCRFs to be deployed as a policy offload function for network-wide S-PCRFs, or hierarchical policy.
- In yet other implementations, the gateway determines that a subset of subscribers is accessing similar services, which may or may not be predefined. The gateway may be configured to correlate the subset of subscribers into a subscriber group. The subscriber group may be grouped by location, service requested, application-specific, D-PCRF specific, etc. Hence, one request to a PCRF could set the policy for the entire group such that the policy does not have to be requested for each member of the group. Alternatively, communications flow may be used to set policy for each subscriber of the group, rather than an individual communications flow per subscriber. Subscriber group policy allows the dynamic classification and systematic clustering of subscribers with similar attributes (e.g., usage trends, current services, preferences, profile, etc.) to be clustered and treated in a common manner. While some level of subscriber group policy can be achieved statically, the system allows for dynamic group policy creation based on individual member interactions with the network, with services, or with each other.
- In terms of the infrastructure of the present disclosure,
CPEs 12a-e can be associated with clients, customers, endpoints, handheld devices, or end users wishing to initiate a communication incommunication system 10 via some network. The term 'subscriber' is inclusive of these elements, as well as devices used to initiate a communication, such as a receiver, a computer, a set-top box, an Internet radio device (IRD), a cell phone, a smart phone, a tablet, a personal digital assistant (PDA), an iPad, an iPhone, a Google Droid, or any other device, component, element, or object capable of initiating voice, audio, video, media, or data exchanges withincommunication system 10. CPEs 12a-e may also be inclusive of a suitable interface to the human user, such as a display, a keyboard, a touchpad, a remote control, or other terminal equipment. CPEs 12a-e may also be any device that seeks to initiate a communication on behalf of another entity or element, such as a program, a database, or any other component, device, element, or object capable of initiating an exchange withincommunication system 10. Data, as used herein in this document, refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another. -
Connection server 18 may be an authentication, authorization, and accounting (AAA) server or home subscriber service (HSS) server. For an AAA server, authentication refers to the process where a user's or CPE's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials. The authorization function determines whether a particular user or CPE is authorized to perform a given activity, typically inherited from authentication when logging on to an application or service. Accounting refers to the tracking of network resource consumption by users or CPEs for the purpose of capacity and trend analysis, cost allocation, billing, etc. A HSS server typically contains subscription-related information (subscriber profiles for users or CPEs 12a-e), performs authentication and authorization of the users or CPEs, and can provide information about the subscriber's location and IP information. - D-
PCRF server 20 may be an operator-owned entity residing under operational control of the same entity that ownsnetwork 14. D-PCRF server 20 may be configured to determine policy rules in a multimedia network. For example, D-PCRF server 20 may be configured to determine policy rules for a specific subscriber such as how to treat a subscriber (e.g.,CPEs 12a-e) for aggregate services, how to prioritize service lists, generic charging/QoS for undefined services, etc. D-PCRF server 20 may also be configured to provide a service definition (e.g., 5-tuple, Appl-layer, etc.), the location of service specific S-PCRF servers PCRF server 20 may accesses subscriber databases and other specialized functions, such as charging systems, in a scalable and centralized manner. - S-PCRF may or may not be an operator-owned entity (meaning there is no requirement that
network 14 and S-PCRF servers PCRF servers PCRF servers PCRF servers - D-
PCRF server 20 and S-PCRF servers network 14, operational support systems, and other sources (such as portals) in real time and supports the creation of rules and then makes policy decisions for each user orCPEs 12a-e active on the network. Such a network can offer multiple services, policies such as quality of service (QoS) levels, and charging rules. - Network 14 (and others discussed herein) represents a series of points or nodes of interconnected communication paths for receiving and transmitting packets of information that propagate through the architecture.
Network 14 offers a communicative interface between sources and/or hosts, and each may be any local area network (LAN), wireless local area network (WLAN), metropolitan area network (MAN), Intranet, Extranet, WAN, virtual private network (VPN), or any other appropriate architecture or system that facilitates communications in a network environment. The architecture of the present disclosure may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network. The architecture of the present disclosure may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol, where appropriate and based on particular needs. -
Network 14 may implement a UDP/IP connection and use a TCP/IP communication language protocol in particular embodiments of the present disclosure. Further,network 14 may implement any other suitable communication protocol for transmitting and receiving data packets within the architecture. Data, as used herein in this document, refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another. - In one particular instance, the architecture of the present disclosure can be associated with a service provider digital subscriber line (DSL) deployment. In other examples, the architecture of the present disclosure would be equally applicable to other communication environments, such as an enterprise wide area network (WAN) deployment, cable scenarios, broadband generally, fixed wireless instances, fiber to the x (FTTx), which is a generic term for any broadband network architecture that uses optical fiber in last-mile architectures. The architecture of the present disclosure may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network. The architecture of the present disclosure may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol, where appropriate and based on particular needs.
-
Access gateway 16,connection server 18, D-PCRF server 20 and S-PCRF servers - In one implementation,
access gateway 16,connection server 18, D-PCRF server 20 and/or S-PCRF servers access module 26,connection module 28, default subscriber and service policy/chargingmodule 30, and subscriber andservice policy module 32. Additionally, each of these elements can have an internal structure (e.g., a processor, a memory element, etc.) to facilitate some of the operations described herein. In other embodiments, these policy and switching activities may be executed externally to these elements, or included in some other network element to achieve the intended functionality. Alternatively,access gateway 16,connection server 18, D-PCRF server 20 and S-PCRF servers - Turning to
FIGURE 1B, FIGURE 1B is a simplified block diagram illustrating one possible set of details associated withcommunication system 10. This particular configuration includesCPEs 12a-e,network 14,access gateway 16,connection server 18, andservice provider 24a. CPEs 12a-c are grouped into afirst group 38a.CPEs second group 38b.Access gateway 16 may includeaccess module 26 and default subscriber and service policy/chargingmodule 30.Access module 26 may includeprocessor 34a andmemory 36a. Default subscriber and service policy/chargingmodule 30 may includeprocessor 34c andmemory 36c.Connection server 18 may includeconnection module 28.Connection module 28 may includeprocessor 34b andmemory 36b.Service provider 24a may include subscriber andservice module 32. Subscriber andservice module 32 may includeprocessor 34d andmemory 36d. -
First group 38a has at least one common characteristic such as location, service requested, application-specific, D-PCRF specific, etc. One request from any CPE infirst group 38a to a PCRF (e.g., D-PCRF 20 or S-PCRF 22a) could set the policy for the entire group such that the policy does not have to be requested for each member of the group. Alternatively, communications flow can be used to set policy for each subscriber of the group, rather than an individual communications flow per subscriber. - Similarly,
second group 38b has at least one common characteristic such as location, service requested, application-specific, D-PCRF specific, etc. Note that at least one common characteristic forsecond group 38b may or may not be different than the at least one common characteristic forfirst group 38a. One request from any CPE insecond group 38b to a PCRF (e.g., D-PCRF 20 or S-PCRF 22a) could set the policy for the entire group such that the policy does not have to be requested for each member of the group. Alternatively, communications flow can be used to set policy for each subscriber of the group, rather than an individual communications flow per subscriber. - In operational terms,
CPE 12a sends a request for a service to accessgateway 16.Access gateway 16 usesaccess module 26 to accessconnection server 18 for authentication on the network. Once authenticated, default subscriber and service policy/chargingmodule 30 is accessed to obtain default subscriber and service policies (default subscriber and service policy/chargingmodule 30 can be located inaccess gateway 16 or D-PCRF 20, as shown inFIGURE 1 ). Subscriber andservice policy module 32 is accessed to determine service specific subscriber and service polices (subscriber andservice policy module 32 can be located inservice provider PCRF FIGURE 1 ).Access module 26 or default subscriber and service policy/chargingmodule 30 may also determine the location of subscriber andservice module 32. - In one example, after
CPE 12a has been authenticated byconnection server 18,access gateway 16 may obtain the maximum allowable download speed forCPE 12a and the maximum amount of data thatCPE 12a can download from default subscriber and service policy/chargingmodule 30. Then, subscriber andservice policy module 32 is located andaccess gateway 16 may obtain the allowable download speed for the service and the amount of data that will be downloaded for the service from subscriber andservice policy module 32.Access gateway 16 can then obtain the service from a provider of the service (e.g.,service provider 24a) and sent the requested service toCPE 12a using the default subscriber and service policies from default subscriber and service policy/chargingmodule 30 and the service specific subscriber and service polices from subscriber andservice policy module 32. - Turning to
FIGURE 1C, FIGURE 1C is a simplified block diagram illustrating one possible set of details associated withaccess gateway 16. Access gateway may includeaccess module 26.Access module 26 may includeprocessor 34a andmemory 36a. In an embodiment,access gateway 16 may also include a gateway general packet radio service support node (GGSN) 40, ahome agent 42, a packet data network gateway (PGW) 44, a session border controller (SBC) 46, a deep packet inspection (DPI)URL filtering monitor 50, avideo gateway 52, or any combination thereof. -
GGSN 40 may be a component of a GPRS network.GGSN 40 may be responsible for the interworking between the GPRS network and external packet switched networks, (e.g., the Internet and X.25 networks). From an external network's point of view,GGSN 40 can be a router to a sub-network, becauseGGSN 40 can 'hide' the GPRS infrastructure from the external network. In one example,GGSN 40 is an anchor point that enables the mobility of a user terminal in GPRS/UMTS networks. In essence,GGSN 40 carries out the role in GPRS equivalent to the home agent in mobile IP.GGSN 40 can maintain routing necessary to tunnel the Protocol Data Units (PDUs) to the SGSN that services a particular mobile station. -
Home agent 42 may be a router on a mobile node's home network which tunnels datagrams for delivery to the mobile node (e.g., amobile CPE 12a) when the mobile node is away from home.Home agent 42 can be configured to maintain current location (IP address) information for the mobile node.Home agent 42 may be used in a Mobile IP (or IP mobility) protocol. Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. (Mobile IP for IPv4 is described in IETF RFC 5944, and extensions are defined in IETF RFC 4721 and Mobile IPv6 is described in RFC 6275.) -
PGW 44 can act as the interface between a LTE network and other packet data networks, such as the Internet, or SIP-based IMS networks.PGW 44 may serve as an anchor point for network mobility and act as a policy and charging enforcement function (PCEF), manage QoS, and/or provide DPI and lawful intercept of data packets.PGW 44 may consist of S5/S8 control and data plane stacks to support S5/S8 interface with a serving gateway.PGW 44 can support a S5/S8 interface with the serving gateway. An integrated control plane stack for the S5/S8 interfaces can consist of IP, UDP, eGTP-C, etc. The integrated data plane stack for the S5/S8 interface can consist of IP, UDP, eGTP-U, etc. -
SBC 46 may be a device deployed in Voice over Internet Protocol (VoIP) networks to exert control over the signaling and also the media streams involved in setting up, conducting, and tearing down telephone calls or other interactive media communications.SBC 46 can be configured to be on the borders between two service provider networks in a peering environment or to include significant deployments between a service provider's access network and a backbone network to provide service to residential and/or enterprise customers.SBC 46 can be inserted into signaling and/or media paths between calling and called parties in a VoIP call, predominantly those using a Session Initiation Protocol (SIP), H.323, and MGCP call signaling protocols. - Turning to
FIGURE 2, FIGURE 2 is asimplified flowchart 200 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure. At 202, a CPE connects to access gateway and requests a service. For example,CPE 12a connects to accessgateway 16. At 204, the access gateway communicates with a connection server to authenticate the CPE. For example,access gateway 16 may connect toconnection server 18 to authenticateCPE 12a. At 206, the system determines if the CPE was authenticated. If the CPE was not authenticated, then the process can stop. If the CPE was authenticated, then a default subscriber policy and a default service policy are obtained, as in 208. For example, the default subscriber policy and default service policy may be obtained from D-PCRF server 20. At 210, a subscriber policy and a service policy for the requested service are obtained from a source for the requested service. For example, a subscriber policy and a service policy for the requested service may be obtained from S-PCRF server 22a. At 212, the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service in the default subscriber policy and the default service policy. For example, the requested service may be obtained fromservice provider 24a and delivered toCPE 12a using the subscriber policy in the service policy for the requested service obtained from S-PCRF server 22a and the default subscriber policy in the default service policy obtained from D-PCRF server 20. - Turning to
FIGURE 3, FIGURE 3 is asimplified flowchart 300 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure. At 302, a CPE connects to an access gateway and requests a service. For example,CPE 12a connects to accessgateway 16. At 304, the access gateway communicates with a connection server to authenticate the CPE. For example,access gateway 16 may connect toconnection module 28 located inconnection server 18 to authenticateCPE 12a. At 306, a default subscriber policy and a default service policy are obtained. For example, the default subscriber policy and default service policy may be obtained from default subscriber and service policy/chargingmodule 30. At 308, a subscriber policy and a service policy for the requested service are obtained from a source of the requested service. For example, a subscriber policy and a service policy for the requested service may be obtained from subscriber andservice policy module 32 located inservice provider 24a. - At 310, the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service, and the default subscriber policy and the default service policy. For example, the requested service may be obtained from
service provider 24a and delivered toCPE 12a using the subscriber policy in the service policy for the requested service obtained from subscriber andservice policy module 32 and the default subscriber policy in the default service policy obtained from default subscriber and service policy/chargingmodule 30. - At 312, the system determines if a request is received from the CPE for a new service. If the system determines that the received request is not from the CPE for a new service, then the process ends. If the system determines that the received request is from the CPE for a new service, then a new subscriber policy and a new service policy for the new requested service is obtained from a source of the new requested service, as in 314. For example, a subscriber policy and a service policy for the requested service may be obtained from S-
PCRF server 22b. At 316, the new requested service is obtained and delivered to the CPE using the new subscriber policy and the new service policy for the new requested service in the default subscriber policy and the default service policy. For example, the requested new service may be obtained fromservice provider 24b and delivered toCPE 12a using the subscriber policy in the service policy for the requested service obtained from S-PCRF server 22b and the default subscriber policy in the default service policy obtained from D-PCRF server 20. At 312, the system determines if a request is received from the CPE for a new service. - Turning to
FIGURE 4, FIGURE 4 is asimplified flowchart 400 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure. At 402, a CPE connects to an access gateway and requests a service. For example,CPE 12a connects to accessgateway 16. At 404, the access gateway communicates with a connection server to authenticate the CPE. For example,access gateway 16 may connect toconnection server 18 to authenticateCPE 12a. At 406, a default subscriber policy and a default service policy are obtained. For example, the default subscriber policy and default service policy may be obtained from D-PCRF server 20. At 408, a subscriber policy and a service policy for the requested service are obtained from a source for the requested service. For example, a subscriber policy and a service policy for the requested service may be obtained from S-PCRF server 22a, where S-PCRF server 22a has obtained the subscriber policy and service policy fromservice provider 24a. - At 410, the system determines if the subscriber policy and the service policy for the requested service conform to the default subscriber policy in the default service policy. If the system determines that the subscriber policy and the service policy for the requested service information conform to the default subscriber policy and the default service policy, then the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service in the default subscriber policy and the default service policy, as in 412. If the system determines that the subscriber policy and the service policy for the requested service information do not conform to the default subscriber policy and the default service policy, then the system determines if the requested service can be obtained from a different server where the subscriber policy and the service policy for the requested service conforms to the default subscriber policy and the default service policy, as in 414. For example, a different subscriber policy and a service policy for the requested service may be obtained from S-
PCRF server 22b, where S-PCRF server 22b has obtained the different subscriber policy and service policy fromservice provider 24b. - If the system determines that the subscriber policy and the service policy for the requested service cannot be obtained from a different server where the subscriber policy and the service policy for the requested service conforms to the default subscriber policy and the default service policy, then the process ends. If the system determines that the subscriber policy and the service policy for the requested service can be obtained from a different server where the subscriber policy and the service policy for the requested service conforms to the default subscriber policy and the default service policy, then the requested service is obtained from a different server and delivered to the CPE using the subscriber policy and the service policy from the different server and the default subscriber policy and the default service policy, as in 416.
- Turning to
FIGURE 5, FIGURE 5 is asimplified flowchart 500 illustrating example activities for a policy selection and switching function in accordance with one embodiment of the present disclosure. At 502, a CPE connects to an access gateway and requests a service. For example,CPE 12a connects to accessgateway 16. At 504, the access gateway communicates with a connection server to authenticate the CPE. For example,access gateway 16 may connect toconnection server 18 to authenticateCPE 12a. At 506, a default subscriber policy and a default service policy are obtained. For example, the default subscriber policy and default service policy may be obtained from default subscriber and service policy/chargingmodule 30. At 508, a subscriber policy and a service policy for the requested service are obtained from a source for the requested service. For example, a subscriber policy and a service policy for the requested service may be obtained from subscriber andservice policy module 32 located inservice provider 24a. - At 510, the system determines if the subscriber policy and the service policy for the requested service conform to the default subscriber policy in the default service policy. If the system determines that the subscriber policy and the service policy for the requested service information conform to the default subscriber policy and the default service policy, then the requested service is delivered to the CPE using the subscriber policy and the service policy for the requested service in the default subscriber policy and the default service policy, as in 512. If the system determines that the subscriber policy and the service policy for the requested service information do not conform to the default subscriber policy and the default service policy, then the system determines if the subscriber policy and/or the service policy for the requested service can be changed to conform to the default subscriber policy and the default service policy, as in 514.
- If the system determines that the subscriber policy and the service policy for the requested service cannot be changed to conform to the default subscriber policy and the default service policy, then the process ends. If the system determines that the subscriber policy and the service policy for the requested service can be changed to conform to the default subscriber policy and the default service policy, then the requested service is obtained and delivered to the CPE using the changed subscriber policy and/or the changed service policy the default subscriber policy and the default service policy, as in 516.
- In one embodiment, the system determines if any subscriber policies and/or service policies for a previously requested service that is still being delivered to the CPE can be changed to allow the subscriber policy and/or the service policy for the requested service to conform to the default subscriber policy and the default service policy. For example, a first requested service may be delivered using a specific download speed that conforms to the default subscriber policy and the default service policy and the subscriber policy and the service policy for the first requested service. If a subscriber policy and a service policy for a second requested service does not conform to the default subscriber policy and the default service policy, then if possible, the subscriber policy and the service policy for the first requested service may be changed or the download speed for the first requested service may be changed to allow the subscriber policy and/or the service policy for the requested service to conform to the default subscriber policy and the default service policy.
- As identified previously, a network element (e.g., an access gateway) can include software to achieve the policy management operations, as outlined herein in this document. In certain example implementations, the policy and switching management functions outlined herein may be implemented by non-transitory logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor [
processors 34a-d shown inFIGURES 1A and1B ], or other similar machine, etc.). In some of these instances, a memory element [memory 36a-d shown inFIGURES 1A and1B ] can store data used for the operations described herein. This includes the memory element being able to store logic (e.g., software, code, processor instructions) that is executed to carry out the activities described in this Specification. The processor (e.g.,processor 34a-d) can execute any type of instructions associated with the data to achieve the operations detailed herein in this Specification. In one example, the processor could transform an element or an article (e.g., data) from one state or thing to another state or thing. In another example, the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by the processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array [FPGA], an erasable programmable read only memory (EPROM), an electrically erasable programmable ROM (EEPROM)) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof. - Any of these elements (e.g., the network elements, etc.) can include memory elements for storing information to be used in achieving the policy and switching activities as outlined herein. Additionally, each of these devices may include a processor that can execute software or an algorithm to perform the access management activities as discussed in this Specification. These devices may further keep information in any suitable memory element [random access memory (RAM), ROM, EPROM, EEPROM, ASIC, etc.], software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory items discussed herein should be construed as being encompassed within the broad term 'memory element.' Similarly, any of the potential processing elements, modules, and machines described in this Specification should be construed as being encompassed within the broad term 'processor.' Each of the network elements can also include suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment.
- Note that with the examples provided above, interaction may be described in terms of two, three, or four network elements. However, this has been done for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of flows by only referencing a limited number of network elements. It should be appreciated that communication system 10 (and its teachings) are readily scalable and, further, can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of
communication system 10, as potentially applied to a myriad of other architectures. - It is also important to note that the steps in the preceding FIGURES illustrate only some of the possible scenarios that may be executed by, or within,
communication system 10. Some of these steps may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of the present disclosure. In addition, a number of these operations have been described as being executed concurrently with, or in parallel to, one or more additional operations. However, the timing of these operations may be altered considerably. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided bycommunication system 10 in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings of the present disclosure. - Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims.
Claims (10)
- A method, comprising:receiving (402; 502) a request for a service for a subscriber at an access gateway;receiving (406; 506), at the access gateway from a first source, a default subscriber policy and a default service policy for the subscriber;receiving (408; 508), at the access gateway from a second source, a specific subscriber policy and a specific service policy for the subscriber and the service being requested, wherein the first source is physically separate from the second source;if the specific subscriber policy and the specific service policy are different to the default subscriber policy and the default service policy (410; 510), providing (414; 514), at the access gateway, correlation and discrepancy resolution between the default subscriber policy and the specific subscriber policy and between the default service policy and the specific service policy;receiving the service being requested at the access gateway; andcommunicating (416; 516) the service being requested from the access gateway to the subscriber in response to the request.
- The method of Claim 1, further comprising:identifying information within a bearer service request associated with a particular subscriber; anddetermining a specific service policy and charging rules function, PCRF, server to be used for a particular transaction involving the particular subscriber.
- The method of Claim 2, wherein the information within the bearer service request includes a selected one of a group of pieces of information, the group consisting of:a) a destination address;b) a 5-tuple; andc) a uniform resource locator, URL, provided in a hypertext transfer protocol, HTTP, header.
- The method of Claim 1, wherein the access gateway includes a local PCRF functionality to be provided to a particular subscriber.
- The method of Claim 1, wherein the access gateway is configured to evaluate behavior associated with the subscriber in order to respond to subscriber policy requests for particular network services associated with the subscriber.
- The method of Claim 1, wherein the access gateway is configured to determine a subset of subscribers accessing similar services, and to group the subset of subscribers into a subscriber group for which a specific group policy is applied to.
- The method of Claim 6, wherein the subscriber group is formed based on usage trends and current services associated with the subset of subscribers.
- The method of Claim 1, further comprising:receiving a second subscriber policy and a second service policy for the requested service if the specific subscriber policy and the specific service policy for the service being requested do not conform to the default subscriber policy and the default service policy.
- A computer readable medium including executable instructions which, when executed by a processor operable to perform operations, cause the processor to perform all the steps of a method according to any one of the preceding claims.
- A network element, comprising:a memory element; anda processor operable to execute instructions such that the network element is configured to perform all the steps of a method according to any one of claims 1 to 8.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/336,949 US9077661B2 (en) | 2011-12-23 | 2011-12-23 | System and method for policy selection and switching function in a network environment |
PCT/US2012/048674 WO2013095714A1 (en) | 2011-12-23 | 2012-07-27 | Method, logic and network element for policy selection and switching function in a network environment |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2795838A1 EP2795838A1 (en) | 2014-10-29 |
EP2795838B1 true EP2795838B1 (en) | 2016-11-16 |
Family
ID=46705034
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12748608.2A Active EP2795838B1 (en) | 2011-12-23 | 2012-07-27 | Method, logic and network element for policy selection and switching function in a network environment |
Country Status (3)
Country | Link |
---|---|
US (1) | US9077661B2 (en) |
EP (1) | EP2795838B1 (en) |
WO (1) | WO2013095714A1 (en) |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8743885B2 (en) | 2011-05-03 | 2014-06-03 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US9077661B2 (en) | 2011-12-23 | 2015-07-07 | Cisco Technology, Inc. | System and method for policy selection and switching function in a network environment |
US9735971B2 (en) * | 2012-09-17 | 2017-08-15 | Telefonaktiebolaget Lm Ericsson (Publ) | High-availability, scalable policy and charging control systems, and methods therefor |
US9705685B2 (en) * | 2012-09-20 | 2017-07-11 | Nec Corporation | Charging control method and system in communication network |
US9794379B2 (en) | 2013-04-26 | 2017-10-17 | Cisco Technology, Inc. | High-efficiency service chaining with agentless service nodes |
US9609492B2 (en) * | 2013-10-17 | 2017-03-28 | Openet Telecom Ltd. | Method and system for dynamically creating tunnels suitable for metering and managing usage data for applications and services |
US9344337B2 (en) | 2014-03-13 | 2016-05-17 | Cisco Technology, Inc. | Service node originated service chains in a network environment |
US9479443B2 (en) | 2014-05-16 | 2016-10-25 | Cisco Technology, Inc. | System and method for transporting information to services in a network environment |
US9379931B2 (en) | 2014-05-16 | 2016-06-28 | Cisco Technology, Inc. | System and method for transporting information to services in a network environment |
US10417025B2 (en) | 2014-11-18 | 2019-09-17 | Cisco Technology, Inc. | System and method to chain distributed applications in a network environment |
US9660909B2 (en) | 2014-12-11 | 2017-05-23 | Cisco Technology, Inc. | Network service header metadata for load balancing |
USRE48131E1 (en) | 2014-12-11 | 2020-07-28 | Cisco Technology, Inc. | Metadata augmentation in a service function chain |
US9762402B2 (en) | 2015-05-20 | 2017-09-12 | Cisco Technology, Inc. | System and method to facilitate the assignment of service functions for service chains in a network environment |
US11044203B2 (en) | 2016-01-19 | 2021-06-22 | Cisco Technology, Inc. | System and method for hosting mobile packet core and value-added services using a software defined network and service chains |
US10187306B2 (en) | 2016-03-24 | 2019-01-22 | Cisco Technology, Inc. | System and method for improved service chaining |
US10931793B2 (en) | 2016-04-26 | 2021-02-23 | Cisco Technology, Inc. | System and method for automated rendering of service chaining |
US10419550B2 (en) | 2016-07-06 | 2019-09-17 | Cisco Technology, Inc. | Automatic service function validation in a virtual network environment |
US10218616B2 (en) | 2016-07-21 | 2019-02-26 | Cisco Technology, Inc. | Link selection for communication with a service function cluster |
US10320664B2 (en) | 2016-07-21 | 2019-06-11 | Cisco Technology, Inc. | Cloud overlay for operations administration and management |
US10225270B2 (en) | 2016-08-02 | 2019-03-05 | Cisco Technology, Inc. | Steering of cloned traffic in a service function chain |
US10218593B2 (en) | 2016-08-23 | 2019-02-26 | Cisco Technology, Inc. | Identifying sources of packet drops in a service function chain environment |
US10361969B2 (en) | 2016-08-30 | 2019-07-23 | Cisco Technology, Inc. | System and method for managing chained services in a network environment |
US11057767B2 (en) * | 2016-10-11 | 2021-07-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and node for handling attachment of a UE |
US10225187B2 (en) | 2017-03-22 | 2019-03-05 | Cisco Technology, Inc. | System and method for providing a bit indexed service chain |
US10884807B2 (en) | 2017-04-12 | 2021-01-05 | Cisco Technology, Inc. | Serverless computing and task scheduling |
US10257033B2 (en) | 2017-04-12 | 2019-04-09 | Cisco Technology, Inc. | Virtualized network functions and service chaining in serverless computing infrastructure |
US10333855B2 (en) | 2017-04-19 | 2019-06-25 | Cisco Technology, Inc. | Latency reduction in service function paths |
US10554689B2 (en) | 2017-04-28 | 2020-02-04 | Cisco Technology, Inc. | Secure communication session resumption in a service function chain |
US10812532B2 (en) | 2017-06-15 | 2020-10-20 | Palo Alto Networks, Inc. | Security for cellular internet of things in mobile networks |
US11050789B2 (en) | 2017-06-15 | 2021-06-29 | Palo Alto Networks, Inc. | Location based security in service provider networks |
US10834136B2 (en) | 2017-06-15 | 2020-11-10 | Palo Alto Networks, Inc. | Access point name and application identity based security enforcement in service provider networks |
US10721272B2 (en) | 2017-06-15 | 2020-07-21 | Palo Alto Networks, Inc. | Mobile equipment identity and/or IOT equipment identity and application identity based security enforcement in service provider networks |
US10693918B2 (en) * | 2017-06-15 | 2020-06-23 | Palo Alto Networks, Inc. | Radio access technology based security in service provider networks |
US10708306B2 (en) | 2017-06-15 | 2020-07-07 | Palo Alto Networks, Inc. | Mobile user identity and/or SIM-based IoT identity and application identity based security enforcement in service provider networks |
US10735275B2 (en) | 2017-06-16 | 2020-08-04 | Cisco Technology, Inc. | Releasing and retaining resources for use in a NFV environment |
US10798187B2 (en) | 2017-06-19 | 2020-10-06 | Cisco Technology, Inc. | Secure service chaining |
US10397271B2 (en) | 2017-07-11 | 2019-08-27 | Cisco Technology, Inc. | Distributed denial of service mitigation for web conferencing |
US10673698B2 (en) | 2017-07-21 | 2020-06-02 | Cisco Technology, Inc. | Service function chain optimization using live testing |
US11063856B2 (en) | 2017-08-24 | 2021-07-13 | Cisco Technology, Inc. | Virtual network function monitoring in a network function virtualization deployment |
US10791065B2 (en) | 2017-09-19 | 2020-09-29 | Cisco Technology, Inc. | Systems and methods for providing container attributes as part of OAM techniques |
US11018981B2 (en) | 2017-10-13 | 2021-05-25 | Cisco Technology, Inc. | System and method for replication container performance and policy validation using real time network traffic |
US10541893B2 (en) | 2017-10-25 | 2020-01-21 | Cisco Technology, Inc. | System and method for obtaining micro-service telemetry data |
US10666612B2 (en) | 2018-06-06 | 2020-05-26 | Cisco Technology, Inc. | Service chains for inter-cloud traffic |
US10841844B1 (en) * | 2019-08-14 | 2020-11-17 | Dish Wireless L.L.C. | Anchor point movement in a compound cellular network |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7062567B2 (en) * | 2000-11-06 | 2006-06-13 | Endeavors Technology, Inc. | Intelligent network streaming and execution system for conventionally coded applications |
US6961773B2 (en) * | 2001-01-19 | 2005-11-01 | Esoft, Inc. | System and method for managing application service providers |
US7096212B2 (en) * | 2001-11-21 | 2006-08-22 | Forhealth Technologies, Inc. | Serial data capture and processing |
US8280354B2 (en) * | 2005-10-27 | 2012-10-02 | Research In Motion Limited | Method and system for provisioning wireless services |
US20070143851A1 (en) * | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
US8635307B2 (en) * | 2007-02-08 | 2014-01-21 | Microsoft Corporation | Sensor discovery and configuration |
US20090161575A1 (en) | 2007-12-19 | 2009-06-25 | Research In Motion Limited | Long Term Evolution User Equipment Multi-Packet Data Network Connectivity Control |
US7987163B2 (en) * | 2008-02-12 | 2011-07-26 | Bae Systems Information And Electronic Systems Integration Inc. | Apparatus and method for dynamic web service discovery |
US8640188B2 (en) * | 2010-01-04 | 2014-01-28 | Tekelec, Inc. | Methods, systems, and computer readable media for providing group policy configuration in a communications network using a fake user |
US9077661B2 (en) | 2011-12-23 | 2015-07-07 | Cisco Technology, Inc. | System and method for policy selection and switching function in a network environment |
-
2011
- 2011-12-23 US US13/336,949 patent/US9077661B2/en active Active
-
2012
- 2012-07-27 WO PCT/US2012/048674 patent/WO2013095714A1/en active Application Filing
- 2012-07-27 EP EP12748608.2A patent/EP2795838B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2795838A1 (en) | 2014-10-29 |
US9077661B2 (en) | 2015-07-07 |
US20130166746A1 (en) | 2013-06-27 |
WO2013095714A1 (en) | 2013-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2795838B1 (en) | Method, logic and network element for policy selection and switching function in a network environment | |
US11234158B2 (en) | System and method for deferred delivery of content based on congestion in a network environment | |
US7899039B2 (en) | System and method for providing location and access network information support in a network environment | |
US9755843B2 (en) | System and method for providing policy charging and rules function discovery in a network environment | |
US9210122B2 (en) | System and method for inspecting domain name system flows in a network environment | |
US8595368B2 (en) | Method and system for providing mobility management in a network | |
US8218459B1 (en) | Topology hiding of a network for an administrative interface between networks | |
WO2019086719A1 (en) | Policy-driven local offload of selected user data traffic at a mobile edge computing platform | |
US20150334027A1 (en) | System and method for transporting information to services in a network environment | |
US10681086B2 (en) | Methods, devices and computer programs for subjecting traffic associated with a service to a specific treatment | |
US20100299451A1 (en) | Ims diameter router with load balancing | |
US10397784B2 (en) | Method for authorizing the establishment of a peer-to-peer stream in a mobile telecommunications network | |
US11082502B2 (en) | Policy architecture for cable networks | |
US20180192362A1 (en) | S9 roaming session destination selection | |
US8601107B2 (en) | Method and apparatus for enabling a service-aware mobile core network | |
Aghayeva | IMPLEMENTATION OF THE DIAMETER PROTOCOL IN THE MOBILE 4TH GENERATION (4G) RADIOTELEPHONE NETWORK | |
CN118101475A (en) | Gateway apparatus, system and method for providing forwarding policy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140116 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20160608 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 846825 Country of ref document: AT Kind code of ref document: T Effective date: 20161215 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602012025456 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20161116 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 846825 Country of ref document: AT Kind code of ref document: T Effective date: 20161116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170216 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170217 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170316 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602012025456 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170216 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20170817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170727 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170731 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170731 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170727 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 7 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170727 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20120727 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161116 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170316 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 602012025456 Country of ref document: DE Representative=s name: KILBURN & STRODE LLP, NL |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230525 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20230727 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20230727 Year of fee payment: 12 Ref country code: DE Payment date: 20230727 Year of fee payment: 12 |